CMGT 554 IT Infrastructure: Information Security

2218 Words9 Pages
Week 6 Individual Project David T. Humphrey CMGT/554 IT Infrastructure October 8, 2012 LaShanda Perry Ensuring Patton-Fuller Community Hospitals’ Patient Privacy With any information system, information security needs to be taken into consideration simply for the fact that information is a commodity that has value, either monetary or for mischief and Patton Fuller Community Hospitals’ information is no exception. Information resources are distributed throughout an organization and beyond because Internet and wireless technologies extend and connect organizational boundaries. Patton Fuller is a plethora of information systems and information data traffic flowing between their different information systems. In the ward floors,…show more content…
Two basic approaches are used in deliberate attacks on computer systems: data tampering and programming attack. Data tampering is a common means of attack that refers to an attack when someone enters false, fabricated or fraudulent data into a computer or changes or deletes existing data. This is the method often used by insiders and fraudsters and is extremely serious because it may not be detected. Programming attacks are popular with computer criminals that use programming techniques to modify other computer programs. For these types of crimes, programming skill and knowledge of the targeted systems are needed. Examples are viruses, worms, and Trojan horses, which are types of malicious code, called…show more content…
A biometric control is an automated method of verifying the identity of a person, based on physical or behavioral characteristics. Biometrics consists of thumbprint or fingerprint, retinal scan, voice scan or signature. Biometric controls are now integrated into many e-business hardware and software products. Network access control (NAC) products. NAC tools are different from traditional security technologies and practices that focus on file access. While file-level security is useful for protecting data, it does not keep unauthorized users out of the network in the first place. NAC technology, on the other hand, helps businesses lock down their networks against criminals. Network security measures involve three layers: perimeter security (access), authentication, and authorization and consists of questions like who you are, where you are and what do you want (Turban, 2009). Another technology is firewalls. A firewall is a system, or group of systems, that enforces an access-control policy between two networks. It is commonly used as a barrier between a secure corporate intranet or other internal networks and the Internet, which is
Open Document